Brief Description

Randex.D spreads across shared network resources. It scans IP addresses generated at random and attempts to access them through the port 445. If successful, Randex.D attempts to gain access to the shared network resources by using passwords that are typical or easy to guess, in order to make copies of itself.

In order to be run, it creates a programmed task in the remote computer.

Visible Symptoms

A clear indication that Randex.D has reached the computer is that it increases the network traffic on the port 445.